
Cybersecurity for the Next Generation – Who Are You?
We were able to sit down with the students and graduates who present their researches at Kaspersky Lab`s “Cybersecurity for the Next Generation” students conference that took place last week
756 articles
We were able to sit down with the students and graduates who present their researches at Kaspersky Lab`s “Cybersecurity for the Next Generation” students conference that took place last week
All industries, including IT, need emerging talent and ambitious specialists joining their ranks, bringing with them fresh ideas that help create a foundation for future innovations. Every year millions of
Stefan Tanase, Kaspersky Lab’s Senior Security Researcher, Global Research & Analysis Team, answers users’ questions about social networks, malware and everything in between. There is a saying: “information is power”
Olga Rumyantseva has succeeded in her solo-climb of the highest volcano in Antarctica – Mount Sidley! Olga was lucky with the weather (though you could be forgiven for thinking otherwise
Renowned mountaineer Olga Rumyantseva has started her first ascent of the Kaspersky 7 Volcanoes expedition. Olga is set to solo-climb the highest volcano on each continent and a week ago
The last year has seen a lot of changes in the threat landscape, with the emergence of a number of new cyber espionage tools such as Gauss and Flame, as
It’s always frustrating if your smartphone or tablet gets lost or stolen – and that frustration is compounded by the loss of valuable data stored in the device’s memory. Worse
In a three-month period this year, Kaspersky Lab products detected and prevented nearly 1.5 billion attempts to infect users’ computers. These included attacks on mobile devices and malware targeting Mac
Windows Phone doesn’t have the market reach of Android-powered devices, or the slick appeal of the Apple iPhone, but the availability of multiple Windows 8 devices late this year could
Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there
Google’s Android operating system far and away dominates the mobile market with more than 68 percent of devices running the open source OS, according to research firm IDC. Whilst this
U.S. customs officials are increasingly interested in the data stored on mobile devices and laptops. For international travelers who have sensitive data on their phones (we mean corporate folks, not
Hackers spent much of 2012 laying the groundwork for what they have in store for not only big business and strategic government and military targets, but consumers as well in
There is no shortage of hard problems to solve in security. Unsafe Web applications, network defense, mobile device security–all of these are challenges in need of solutions. And the students
A common lament in the security industry is the lack of young talent, of educated and dedicated people coming out of universities with fresh ideas. Executives and engineers often wonder
Those looking to tighten the security of their internet browsing experiences have a lot of choices these days. There is a slew of security and privacy related plug-ins available for
In terms of security it’s not the one who has more talented programmers who creates the best protection. Instead, it’s often the one who’s been attacked the most who’s forced
Eugene Kaspersky has had an interesting, varied life, with more than his share of adventures, successes and challenges. He’s seen and done a lot, but when he learned that he
If you’re a regular DropBox user, you may have noticed that your inbox has been full of spam this summer. Well, DropBox noticed it too (they had it pointed out
As you already know, Windows 8 has some major differences from Windows 7. In order to provide the best and most secure user experience, we created KIS2013 and KAV2013 modified
When it comes to online security, you need to be completely protected. You need hybrid protection, the combined power of the cloud and your PC. As great as cloud security